An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis

Black-bag cryptanalysis is used to acquire the cryptographic secrets from the target computers and devices through burglary or covert installation of keylogging and Trojan horse hardware/software. To overcome black-bag cryptanalysis, the secure authentication protocols are required. It mainly focuse...

Full description

Saved in:
Bibliographic Details
Published in2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) pp. 1 - 6
Main Authors Divya, R., Muthukumarasamy, S.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.01.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Black-bag cryptanalysis is used to acquire the cryptographic secrets from the target computers and devices through burglary or covert installation of keylogging and Trojan horse hardware/software. To overcome black-bag cryptanalysis, the secure authentication protocols are required. It mainly focuses on keylogging where the keylogger hardware or software is used to capture the client's keyboard strokes to intercept the password. They considers various root kits residing in PCs (Personnel Computers) to observe the client's behavior that breaches the security. The QR code can be used to design the visual authentication protocols to achieve high usability and security. The two authentication protocols are Time based One-Time-Password protocol and Password-based authentication protocol. Through accurate analysis, the protocols are proved to be robust to several authentication attacks. And also by deploying these two protocols in real-world applications especially in online transactions, the strict security requirements can be satisfied.
DOI:10.1109/ISCO.2015.7282330